Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards SysML v2 as a Variability Modeling Language., , , and . MoDELS (Companion), page 251-256. IEEE, (2023)Assessing adversarial training effect on IDSs and GANs., , , and . CSR, page 543-550. IEEE, (2021)Threats to Adversarial Training for IDSs and Mitigation., , , and . SECRYPT, page 226-236. SCITEPRESS, (2022)The arpanet telnet protocol: Its purpose, principles, implementation, and impact on host operating system design., , , , , and . SIGCOMM, page 4. ACM, (1977)California utilities bounced back to protect systems and restore service after the destructive upheaval, , , , and . IEEE Power Engineering Review, (1994)Détection d'erreur au plus tôt dans les systèmes temps réel : une approche basée sur la vérification en ligne.. National Polytechnic Institute of Toulouse, France, (2009)Java settlers: a research environment for studying multi-agent negotiation., and . IUI, page 240-240. ACM, (2002)SMARTphone inertial sensors based STEP detection driven by human gait learning., , , and . IPIN, page 1-8. IEEE, (2021)Assessing the Threat Level of Software Supply Chains with the Log Model., , and . IEEE Big Data, page 3079-3088. IEEE, (2023)A human-like walking gait simulator for estimation of selected gait parameters., , , , and . WPNC, page 1-6. IEEE, (2017)